Top tips for securing your apps

Top tips for securing your apps

1 Use Strong Authentication to Limit Unauthorised Access

Strong authentication should be a pillar of security. Ideally, everyone would use multifactor authentication (MFA), especially for any system that connects to high-value services and data stores. When MFA isn’t feasible, strengthen the use of passwords. At the very least, eliminate the usage of previously exposed passwords.

2 Practice Regular Monitoring and Logging

With a good logging and review regimen, it’s possible to catch breach attempts in progress before real damage can occur. When reviewing logging capabilities, remember the goal is to be able to determine how an attacker got in and what they did.

3 Take Inventory

Knowing what you have, where it is, what it talks to, and how it is configured is the foundation for all risk decisions, both strategic and tactical. There are plenty of automation tools available to help be sure that they give you the complete picture.

4 Strategize and Practice Incident Response

No affordable defense is going to keep all the attackers out forever. Plan accordingly with a well-tested, detailed incident response plan. Incident response rests on the pillars of inventory and logging, so make sure those are well-honed.

5 Apply Crucial Patches

It’s unreasonable to assume that your average enterprise is going to patch everything. The highest priority is closing vulnerabilities with published, weaponised exploits, because even unskilled attackers will be pounding on your systems with these point-and-click attacks.

6 Enforce Strict Authorisation

Authorisation means taking a hard look at the permissions associated with any credential set. Least privilege should be used, so that users can only do exactly what they need to do. A good middle ground is to implement role-based access and broadly lock down authorised actions based on general job duties such as administrator, developer, office staff, and remote user.

7 Scan for Vulnerabilities

Vulnerability scanning is useful not only for gaining a “hacker’s eye view” of your systems but it is also a great way to double-check your inventory. Continuous vulnerability scans, preferably weekly, are advisable for both internal and external assets.

8 Detect and Block Malicious Bot Activity

Many bots can be identified by previously observed, unique patterns that have been encoded into signatures. However, newer and more sophisticated bots require complex scrutiny such as looking for irregular behaviour, illogical client configuration, and inhuman timing of actions.

9 Conduct Security Awareness Training

The F5 Labs 2018 Phishing and Fraud Report showed that training employees to recognise phishing attempts can reduce their click-through rate on malicious emails, links, and attachments from 33% to 13%.

10 Use Web Application Firewallsand Antivirus Solutions

WAFs offer a level of application-layer visibility and control that can help mitigate a wide range of the web application threats mentioned above, while antivirus is one of oldest security controls and is still a powerful tool for detecting and stopping malware infections.

11 Use SSL/TLS Inspection

Malware and phishing sites are increasingly being buried within encrypted SSL/TLS sessions, often using legitimate certificates. This traffic needs to be decrypted, inspected, and sanitized.